Spyware, Viruses, & Security forum

Alert

NEWS - October 19, 2012

by Carol~ Forum moderator / October 19, 2012 12:23 AM PDT
Apple removes Java from all OS X Web browsers

Apple has further distanced itself from Oracle's Java software framework with a Mac update released on Wednesday that removes a Java plugin from all Mac-compatible Web browsers.

Users who install the update will find a browser placeholder when they encounter Web-based content that requires Java, according to Sophos security researcher Paul Ducklin. "If you want to run Java applets in your browser on Mac OS X, you need to install the official Oracle Java runtime on the system to do that," another blogger on ghacks.net wrote. "Yes, that runs them in parallel with Apple's version for Java. For users that need both, it means to take care of two versions of Java on the system from that moment on."

Wednesday's update is the latest example of Apple distancing itself from Java. Apple stopped including pre-installed versions of Java in OS X and instead gives users the option to install the framework. More recently, Apple issued an update that turns off Java in the browser when users haven't used it recently.

Continued : http://arstechnica.com/apple/2012/10/apple-removes-java-from-all-os-x-web-browsers/

Also:
Apple updates Java for older Mac OS X - kills browser plugin
Apple gets aggressive - latest OS X Java security update rips out browser support
Apple Patches Java Flaws
Post a reply
Discussion is locked
You are posting a reply to: NEWS - October 19, 2012
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - October 19, 2012
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Rogue Pharma, Fake AV Vendors Feel Credit Card Crunch
by Carol~ Forum moderator / October 19, 2012 12:24 AM PDT

New research suggests that companies behind some of America's best known consumer brands may be far more effective at fighting cybercrime than any efforts to enact more stringent computer security and anti-piracy laws.

Recent legislative proposals in the United States — such as the Stop Online Piracy Act - have sought to combat online trafficking in copyrighted intellectual property and counterfeit goods by granting Internet service providers and authorities broader powers to prosecute offenders, and by imposing stronger criminal penalties for such activity. But recent data collected by academic researchers suggests that brand holders already have the tools to quash much of this activity.

Over the past two years, a team of academic researchers made hundreds of "test buys" at Web sites from 40 different shady businesses peddling knockoff prescription drugs, counterfeit software and fake antivirus products. The researchers, from George Mason University, the International Computer Science Institute, and the University of California, San Diego, posed as buyers for these products, which tend to be promoted primarily via hacked Web sites, junk email and computer viruses.

The test buys were intended to reveal relationships between the shadowy merchants and the banks that process credit and debit card transactions for these businesses. Following the money trail showed that a majority of the purchases were processed by just 12 banks in a handful of countries, including Azerbaijan, China, Georgia, Latvia, and Mauritius. [Screenshot]

Continued : http://krebsonsecurity.com/2012/10/rogue-pharma-fake-av-vendors-feel-credit-card-crunch/

Collapse -
Research Shows Serious Problems With Android App SSL..
by Carol~ Forum moderator / October 19, 2012 1:13 AM PDT
.. Implementations

There are thousands of apps in the Google Play mobile market that contain serious mistakes in the way that SSL/TLS is implemented, leaving them vulnerable to man-in-the-middle attacks that could compromise sensitive user data such as banking credentials, credit card numbers and other information. Researchers from a pair of German universities conducted a detailed analysis of thousands of Android apps and found that better than 15 percent of those apps had weak or bad SSL implementations.

The researchers conducted a detailed study of 13,500 of the more popular free apps on Google Play, the official Android app store, looking at the SSL/TLS implementations in them and trying to determine how complete and effective those implementations are. What they found is that more than 1,000 of the apps have serious problems with their SSL implementations that make them vulnerable to MITM attacks, a common technique used by attackers to intercept wireless data traffic. In its research, the team was able to intercept sensitive user data from these apps, including credit card numbers, bank account information, PayPal credentials and social network credentials.

The team also built a proof-of-concept tool called MalloDroid that was designed to find the potentially exploitable SSL bugs in Android apps, which they then investigated further to determine whether an attack was in fact possible. In a lot of cases--1,074, to be exact--it was.

Continued : https://threatpost.com/en_us/blogs/research-shows-serious-problems-android-app-ssl-implementations-101912
Collapse -
Warning: Three emails you don't want to see in your Inbox
by Carol~ Forum moderator / October 19, 2012 1:14 AM PDT

Here are three emails you don't want to see in your inbox today.

[Screenshot] - [Screenshot] - [Screenshot]

Although the emails may claim to have been sent by the likes of LinkedIn, YouTube and Google the truth is that the headers are forged, and the emails have been specially crafted to look like legitimate communications from online firms.

Clicking on the links could send your computer to Canadian pharmacy-like spam sites offering to sell you Viagra, or even webpages hosting malicious payloads.

Always be careful about clicking on links in unsolicited emails. Hover over links with your mouse to tell where it's really going to before clicking, and keep your anti-virus and anti-spam protection updated.

Continued : http://nakedsecurity.sophos.com/2012/10/19/warning-email/

Collapse -
Keep Your Children Safe Online
by Carol~ Forum moderator / October 19, 2012 1:14 AM PDT

TrendLabs Malware Blog:

It's a parent's responsibility to ensure that wherever their children are, they remain safe, happy and secure. The Internet, in this respect, is no different than any other playground in the park or at school. It looks harmless, even magical at first glance, but could result in some spills and tears if kids are left unsupervised around it.

Instead of bruises and cuts, however, your child may be exposed to inappropriate content, online bullying, or malware. One most recent example is the rogue version of the famous Bad Piggies game app, which lures in victims with the promise of a free version of the game. These and other threats are the troubles you will have to make sure your child steers clear away from.

It's with this in mind that we've created an e-guide that should help parents with the task of introducing their children to the world of the Internet. In this document, we've assembled handy, easy-to-remember tips on responsible browsing, downloading and exemplary internet etiquette, both on desktop and on mobiles. We give ample advice on what to look out for and what limits to set without making the parent seem overbearing on their child's online activities. We also provide a list of what sites to recommend to your child, in order to ease them into what material they should expect and look for.

Responsible, reasonable netizens aren't born - they're made, and it all begins with their parent guiding them.

You can read the e-guide here. For more information about this topic, visit the Trend Micro Internet Safety For Kids blog here.

http://blog.trendmicro.com/trendlabs-security-intelligence/keep-your-children-safe-online/

Collapse -
Illegal content on YouTube? Beware spammed-out malware ..
by Carol~ Forum moderator / October 19, 2012 1:14 AM PDT
.. attack

Internet users are being warned about a malware attack that has been spammed out widely, posing as a communication from YouTube about copyrighted video content.

The emails, which have the subject line "Your video may have illegal content", pretend to come from Google's YouTube team.

Here's an example: [Screenshot]

Subject: Your video may have illegal content
Attached file: Content_ID755658_Matches.zip

Message body:
Your video may have content that is owned or licensed by Music Publishing Rights Collecting Society.

No action is required on your part; however, if you are interested in learning how this affects your video, please open attached file with Content ID Matches section of your account for more information.

Sincerely,
- The YouTube Team


The attached ZIP file, however, contains the Troj/Agent-XXC Trojan horse.

Sophos anti-virus products have been capable of detecting the malware since September 25th - but users of products from other vendors may not be as well protected.

Always be suspicious of unsolicited emails - and don't rush to click on unexpected attachments.

http://nakedsecurity.sophos.com/2012/10/18/illegal-content-youtube-malware/
Collapse -
42% of lost mobiles have no security in place to protect..
by Carol~ Forum moderator / October 19, 2012 1:14 AM PDT
.. data says report

If the UK is any indication, we're letting our precious mobile devices drop from our bags and pockets, scattering our unprotected data throughout the land at an alarming rate.

Surveying 1,008 UK consumers between the ages of 16 and 64, Sophos found that 42 percent of devices that were lost or left in insecure locations had no active security measures to protect data.

More findings from the survey, which was part of a wider awareness campaign regarding mobile device security:

• 20% of lost devices had access to work email, potentially exposing confidential corporate information.
• 20% contained sensitive personal information such as national insurance numbers, addresses and dates of birth.
• Over 10% contained payment information such as credit card numbers and PINs.
• 35% had access to social networking accounts via apps or web browser-stored cookies.

Sophos's James Lyne notes that the lack of awareness around data security among the general public is inevitably going to lead to BYOD-induced holes poked into corporate security:

Continued : http://nakedsecurity.sophos.com/2012/10/19/lost-mobiles-no-security/
Collapse -
French hacker 'admits app fraud' in Amiens
by Carol~ Forum moderator / October 19, 2012 2:35 AM PDT

A 20-year-old hacker has been arrested in northern France for spreading a virus via smartphone "apps" that defrauded thousands of victims.

Prosecutors say he stole tiny sums from 17,000 people, amassing about 500,000 euros (£405,000) since 2011.

Working from his parents' home in northern France, he snared victims with free downloads designed to look like original applications, they say.

But in the background the apps worked to steal money via hidden transactions.

It appears smartphones that use Google software were the most susceptible, says the BBC's Christian Fraser in Paris.

Once the fake applications were downloaded, the virus sent a text message without the user's knowledge to a premium-rate number he had set up.

Continued : http://www.bbc.co.uk/news/world-europe-19994944

Also:
French Hacker Arrested for 'Smartphone App Fraud'
French cops cuff man over €500K Android Trojan scam
Suspected Android SMS malware author arrested in France

Collapse -
HP asks researcher not to publish security vulnerabilities
by Carol~ Forum moderator / October 19, 2012 2:35 AM PDT

Kurt Grutzmacher has identified security vulnerabilities in network equipment from Huawei and H3C, details of which he had planned to publish at this weekend's Toorcon 14 security conference. Two days before the conference, H3C's owners, HP, contacted him with a "cordial and apologetic" voicemail and email asking him to refrain from doing so.

It can only be concluded that, at the very last minute, HP must have come across some unexpected new information that forced the urgent extension of a mutually agreed 45-day non-disclosure period - as Grutzmacher puts it on his blog, "I'm guessing somebody woke up on Tuesday morning and went 'Oh hell, is Toorcon this Saturday?'"

Grutzmacher discovered the vulnerabilities in July and reported them in August, roughly in parallel with Felix Lindner's (FX) presentation on vulnerabilities in Huawei routers at Defcon. He assessed his independently discovered vulnerabilities as critical and had planned to present workarounds enabling affected users to mitigate the risks in his presentation. All of this was known to the companies involved.

Continued : http://www.h-online.com/security/news/item/HP-asks-researcher-not-to-publish-security-vulnerabilities-1733216.html

Also: Demo of "serious" networking vulnerabilities cancelled at HP's request[/b

Collapse -
HSBC banking websites recover from DoS attack
by Carol~ Forum moderator / October 19, 2012 2:35 AM PDT

Major bank HSBC's websites are now all back online, following a denial-of-service (DoS) attack that left customers locked out of their account for nearly 10 hours.

People first began reporting problems accessing us.hsbc.co.uk, hsbc.co.uk and offshore.hsbc.com on Twitter on Thursday at around 5:45pm in the UK, saying they were unable to log in and use the services.

Others said they could not get to First Direct's website. First Direct, which does online and telephone banking only, is part of the HSBC group of companies.

On Friday, HSBC said its sites around the world were now back online.

"All HSBC websites have been available since 3am UK time. Thank you for your patience," the bank said in a post to its Twitter account on Friday morning.

According to the bank, its customers' personal details were not compromised in the attack, which disrupted online services but did not affect the other services such as the use of credit cards, debit cards or cash machines.

Continued : http://www.zdnet.com/uk/hsbc-banking-websites-recover-from-dos-attack-7000006063/

Related:
GitHub and HSBC hit by DDoS attacks
HSBC websites fell in DDoS attack last night, bank admits
HSBC recovers from DDoS attack, after internet banking services disrupted

Collapse -
New Virus FakeLookout.A Discovered by TrustGo Security Labs
by Carol~ Forum moderator / October 19, 2012 2:35 AM PDT

From the TrustGo Security Labs Blog:

On Oct 17th 2012, TrustGo Security Labs uncovered a new malware on Google Play, named Trojan!FakeLookout.A. [Screenshot]

This malware hides itself in the full Application List after installation. It only shows up in the Downloaded app list where it uses Lookout's icon and the name "Updates". [Screenshot]

This malware can receive and execute commands from remote server. Server address: hxxp://[hidden]press.com/controls.php

According to remote server's commands, the malware can steal user's SMS messages and MMS messagesand upload them to remote server via secure FTP. It will also upload the complete file list from the user's SD card to the remote server. Then remote server will control the malware to upload specific files. This is a severe threat to user's privacy and sensitive data.

TrustGo Security Labs successfully accessed the FTP server and discovered uploaded files from some victims. The following is the root directory of the FTP server.

Continued : http://blog.trustgo.com/fakelookout/

Collapse -
BBC Watchdog crew sink teeth into dodgy PC repair shops
by Carol~ Forum moderator / October 19, 2012 2:36 AM PDT

The reputation of the UK's computer repair industry took another hammering last week following a BBC Watchdog investigation into two Worcestershire-based computer repair firms.

The flagship consumer affairs programme looked into Click 4 PC and Click Computers in response to reports from viewers about missing personal data, botched repairs and a computer being held to ransom. The subsequent investigation into Click 4 PC exposed dubious practices including false diagnosis of faults, alleged supply of illegal software and passing off used equipment as being new.

During secret filming of a PC repair callout to Click 4 PC, the customer was supplied with a second-hand hard drive containing other people's data, after agreeing to pay for a new replacement drives. The diagnosis that the hard drive had failed was incorrect yet the victim was charged £200 for the supply of a second-hand hard drive.

Data on the hard drive appeared to have originated from a residential care home for young adults that contained medical records. BBC investigators returned the data to the relevant care home.

The Watchdog investigation also had an undercover reporter look for a job with Click Computers of Birmingham as a field repair engineer. The show reveals the reporter being told it was a sales job, and schooled on various hard sales techniques - including being told to charge a minimum of £120. The consumer interests' show also revealed that Click Computers had used false addresses all over the UK in order to make the claim that it had local offices throughout Britain.

Continued : http://www.channelregister.co.uk/2012/10/18/pc_repairs_watchdog_probe/

Collapse -
Kosovo Group Claims Hack of US Weather Service
by Carol~ Forum moderator / October 19, 2012 5:39 AM PDT

The US National Weather Service computer network was hacked this week, with a group from Kosovo claiming credit and posting sensitive data, security experts said Friday.

Data released by the Kosovo Hackers Security group includes directory structures, sensitive files of the Web server and other data that could enable later access, according to Chrysostomos Daniel of the security firm Acunetix.

"The hacker group stated that the attack is a protest against the US policies that target Muslim countries," Daniel said.

"Moreover, the attack was a payback for hacker attacks against nuclear plants in Muslim countries, according to a member of the hacking group who said, 'They hack our nuclear plants using STUXNET and FLAME-like malwares, they are bombing us 27*7, we can't sit silent -- hack to payback them."

Continued : http://www.securityweek.com/kosovo-group-claims-hack-us-weather-service

Also:
U.S. National Weather Service Hacked
National Weather Service website hacked by Kosova Hacker's Security

Popular Forums
icon
Computer Help 51,224 discussions
icon
Computer Newbies 10,453 discussions
icon
Laptops 20,090 discussions
icon
Security 30,722 discussions
icon
TVs & Home Theaters 20,937 discussions
icon
Windows 10 1,295 discussions
icon
Phones 16,252 discussions
icon
Windows 7 7,684 discussions
icon
Networking & Wireless 15,215 discussions

Finding the best 360 camera

GoPro, Pixpro, or Ricoh?

You can spend hundreds or even thousands of dollars on a 360-degree camera. We tested three of them to find out what kind of quality and ease of use you can expect at each price point.